首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   452篇
  免费   89篇
  国内免费   75篇
  2024年   1篇
  2023年   1篇
  2022年   10篇
  2021年   18篇
  2020年   6篇
  2019年   15篇
  2018年   26篇
  2017年   47篇
  2016年   33篇
  2015年   25篇
  2014年   44篇
  2013年   58篇
  2012年   38篇
  2011年   38篇
  2010年   16篇
  2009年   27篇
  2008年   18篇
  2007年   32篇
  2006年   49篇
  2005年   39篇
  2004年   20篇
  2003年   14篇
  2002年   4篇
  2001年   13篇
  2000年   8篇
  1999年   5篇
  1998年   3篇
  1997年   2篇
  1996年   1篇
  1994年   3篇
  1993年   2篇
排序方式: 共有616条查询结果,搜索用时 31 毫秒
511.
在分析伞降高度选择影响因素的基础上,研究了敌反空降防空火力对伞降高度选择的影响,给出了各类防空火力对不同高度实施空降时运输机和伞兵毁伤数的计算公式;基于伞降高度选择原则建立了伞降高度选择模型.通过实例证明了模型的合理性,可为空降作战决策提供参考依据.  相似文献   
512.
介绍了安全轮胎的定义和主要技术类型,根据车辆防护性对安全轮胎的要求,对考核轮胎防护性的试验评价方法进行了研究,提出了相应的道路行驶试验方法。为了获得轮胎防护性的量化特征,建立了轮胎防护性评价指数模型,为评价轮胎防护性能提供了一种分析方法。  相似文献   
513.
一种防空自动化系统效能的模糊综合评估方法   总被引:1,自引:0,他引:1  
针对防空自动化系统的组成,给出了防空自动化系统效能的指标体系,并通过分析防空自动化系统静态效能和动态效能的关系,运用模糊综合评估和系统性能评价等级划分的方法,在防空自动化系统静态效能评估的基础上,研究了防空自动化系统的动态效能,提出了一种静态效能与动态效能相结合的防空自动化系统模糊综合评估方法。  相似文献   
514.
针对防空作战中电子对抗异常激烈的现实,利用概率论和作战运筹方法,描述了电子干扰对防空兵群射击指挥效率影响的主要特点和评估指标,分析了射击指挥方式与群抗击效率之间的数学关系,建立了搜索雷达、通信系统和火控雷达受到电子干扰时群射击指挥效率的评估模型.结合实例计算,得到了电子干扰对群射击指挥效率影响的基本规律,提出了电子干扰时选择射击指挥方式的原则与方法.  相似文献   
515.
针对现代海战中空袭目标的特点,确定雷达哨舰在编队对空预警中的前出阵位。论述了雷达哨舰在编队对空预警中的使用原则,分析了影响雷达哨舰前出阵位的各因素,建立了雷达哨舰阵位配置和预警机动区的数学模型,采用MATLAB7.0工具仿真计算了模型中各参数对哨舰前出距离和预警机动区面积的影响,得到了雷达哨舰配置的约束条件,可为对编队组织对空预警提供参考。  相似文献   
516.
India and China both have powerful spy networks; completely different in their approaches to espionage; both effective against their perceived enemies. China focuses first on internal threats, on Taiwan and Hong Kong, and then the US and Japan. India’s defense policy focuses on Pakistan and internal terrorist threats, and then on China. In reality, however, when it comes to spying on each other, both China and India suffer from incompetence and apathy – which endangers both their own security and regional stability. This article looks at how they spy on each other, and asks why and how they need to improve. The narrative also touches upon some of the individuals who are waging the spy war, from India’s wily spymaster Ajit Doval down to junior Chinese agents such as Wang Qing and Pema Tsering. The two countries are not friends. They have the largest territorial dispute in the world on their hands, covering an area the size of North Korea, and they have large armies facing each other along 4000 kilometers of frontier. But they also lay claim to the world’s two oldest and richest civilizations, with a rich history of exchange, and now with a combined population of 2.6 billion people and more than a quarter of the world’s economic output. If they cooperated, they could solve many of the world’s problems; but if they lurch into conflict, the potential consequences are terrifying to contemplate. Unfortunately, despite their geographical closeness, they do not know much about each other. They have few cultural interchanges, little diplomacy, few trade missions. They do not watch each other’s films, read each other’s books or listen to each other’s music. Chinese tourists would rather fly to New Zealand for their holidays than cross the border to India, and Indian students would rather study in Europe than China. China and India are neighbors that barely talk to each other. Most significantly, they do not spy on each competently. For countries that do not interact socially, defensive understanding is important for security – but China prefers the glamor of facing up to its Pacific and other maritime rivals such as the US and Japan. India, for its part, does talk a great deal about the China threat, but its resources and expertise are wrapped up in controlling its security threat from Pakistan and the Islamic world. When China and India do try to spy on each other, it is often without the benefit of a long-term focus or understanding. India has some very skilled operatives within the Research and Analysis Wing, but few that specialize in China. China has an enormous pool of resources spread across several government departments, including the Ministry of Public Security, and also has extensive facilities and manpower in the Joint Staff Department of the Central Military Commission (the JSD) and the new Strategic Support Force (the SSF). However, China’s intelligence services generally behave as if India is not worth spying on. Given that the two countries do not have the cultural or political machinery in place to understand each other, espionage and intelligence gathering is vital to ensure that miscalculations do not take place. This has been apparent over the last few years in stand-offs in the Himalaya, as well as top-level suspicions on each side about a variety of subjects including terrorism, covert operations in Sri Lanka and Burma, and the two countries’ nuclear weapons programs. Both countries do occasionally make efforts in espionage against each other, especially during sensitive periods such as the mountain stand-offs of 2014 and 2013 and during policy developments in nuclear warfare. In this article the author looks at actual spying incidents between the two countries, their methodologies, their staff, their technical capabilities, and how the act of spying, which is usually viewed as intrinsically adversarial, can be a force for good. The article relies on interviews with actual participants in intelligence from both countries as well as extensive use of contemporary online sources, and secondary analysis by both military and academic experts from China, India and NATO countries.  相似文献   
517.
The US role in the North Atlantic Treaty Organization (NATO) Alliance is a 65-year history of retrenchment and renewal. When Washington has sought a retrenchment from the world, it traditionally increased burden sharing pressure on Europe to do more. During times of increased global ambition, the USA reaffirmed its traditional leadership role in the Alliance and its commitment to NATO effectiveness and relevance. This cycle of NATO retrenchment and renewal, however, is halting. Though the USA will continue to go through periods of relative increases and decreases in security policy ambition, signs point to a permanent defense and security retrenchment in Europe. Germany is the ally singularly capable of filling the resulting security gap. If NATO is to avoid the drift toward irrelevance many critics have predicted, Germany will need to cast off old inhibitions toward security and defense leadership. These trends and their implications for NATO's future are explored through historical case studies and the shifting contemporary security environment.  相似文献   
518.
We present a validation of a centralized feedback control law for robotic or partially robotic water craft whose task is to defend a harbor from an intruding fleet of water craft. Our work was motivated by the need to provide harbor defenses against hostile, possibly suicidal intruders, preferably using unmanned craft to limit potential casualties. Our feedback control law is a sample‐data receding horizon control law, which requires the solution of a complex max‐min problem at the start of each sample time. In developing this control law, we had to deal with three challenges. The first was to develop a max‐min problem that captures realistically the nature of the defense‐intrusion game. The second was to ensure the solution of this max‐min problem can be accomplished in a small fraction of the sample time that would be needed to control a possibly fast moving craft. The third, to which this article is dedicated, was to validate the effectiveness of our control law first through computer simulations pitting a computer against a computer or a computer against a human, then through the use of model hovercraft in a laboratory, and finally on the Chesapeake Bay, using Yard Patrol boats. © 2016 Wiley Periodicals, Inc. Naval Research Logistics 63: 247–259, 2016  相似文献   
519.
ABSTRACT

China’s defense science, technology, and industrial system has been undergoing a far-reaching transformation over the past two decades and the single biggest factor behind this turnaround is the role of external technology and knowledge transfers and the defense industry’s improving ability to absorb these inputs and convert into localized output. China is pursuing an intensive campaign to obtain defense and dual-use civil–military foreign technology transfers using a wide variety of means, which is explored in this article.  相似文献   
520.
分析了近期内有人/无人机协同作战的体系结构及作战模式,基于三代战机座舱普遍装备的多功能显示器,展开有人/无人机指挥控制界面的设计;基于人机工程学观点和飞行员的视觉习惯,从缓解飞行员的心理和生理疲劳的角度出发布置无人机编队的飞行参数,设计了有人/无人机执行协同对地攻击任务时包含巡航队形、战斗队形、任务类型、导航点切换等功能的指挥控制界面。为未来短期内有人/无人机协同作战指挥控制系统研究提供参考。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号